You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+14-1Lines changed: 14 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -3,19 +3,32 @@ a simple return-to-libc attack example
3
3
4
4
tips:
5
5
(1) 32 bit Linux Platform
6
+
6
7
(2) you need to be root,and run "sysctl -w kernel.randomize_va_space=0" to shut the random space down
8
+
7
9
(3) export MYSH=/bin/sh to tell the getenv the vaiable value(it's a way to pass paramters)
10
+
8
11
(4) chmod 4777 retlib (you need to be root)
12
+
9
13
(5) run getenv.c first to get the "/bin/bash" address,and use the value to alter exploit.c and run it.run the retlib at last.you'll see the "$" indicator for root.
10
14
11
-
tips(chinese version):
15
+
(6)please compile all the files with gcc -fno-stack-protector flag.
0 commit comments